Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Anti-elastic-leakage encryption method and system based on identification

An encryption system and identity technology, which is applied to the public key and key distribution of secure communication, can solve the problems of high calculation cost of encryption steps, long public key and private key, and low relative key leakage ratio. Effects of shortness, efficiency improvement, and calculation reduction

Active Publication Date: 2015-01-28
马鞍山城智信息技术有限公司
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the problems existing in the prior art, the calculation cost of the encryption step is very high, the operation efficiency is low, the index operation is many, the key public key and private key are long, and the relative key leakage ratio is low, the present invention provides an identity-based Resilient Leakage Resistant Encryption System and Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-elastic-leakage encryption method and system based on identification
  • Anti-elastic-leakage encryption method and system based on identification
  • Anti-elastic-leakage encryption method and system based on identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] The present invention is improved on the basis of Gentry's IBE scheme and the Elastic Leakage IBE scheme of Alwen et al. The improved scheme has lower calculation cost, shorter key (public key / private key) length and Higher relative key leak ratio.

[0049] Let's first explain the related concepts:

[0050] 1. Bilinear Pairing

[0051] Here is a brief introduction to the basic definition of a bilinear map and the properties it needs to satisfy.

[0052] Let G and G T are two multiplicative cyclic groups of the same order p, where p is a large prime number. g is the generator of the group G, and the computable bilinear map (Bilinear Map) e:G×G→G T has the following properties:

[0053] (1) Bilinearity: For any u, v∈G and a, b∈Ζ p , all have e(u a ,v b )=e(u,v) ab ;

[0054] (2) Non-degeneracy: For the generator g of G, e(g,g)≠1 is obtained;

[0055] (3) Computability: There is an effective polynomial time algorithm that can calculate e(u,v)∈G T , where u, v∈G...

Embodiment 2

[0119] The following will describe the application of the above-mentioned encryption system according to the present invention in an enterprise.

[0120] According to the steps of the present invention, when the encryption system of the present invention is used in XXX company, the work card number of each employee of XXX company can be regarded as an employee U, whose identity information is id, and the user private key generation module according to the system parameters and id to generate the private key sk of the user U id , and stored in the personal card with the employee.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-elastic-leakage encryption method and system based on identification and belongs to the field of data encryption. The system comprises a trusted third party private key generation center module and a user module, wherein the trusted third party private key generation center module comprises an online task distributor and a private key generator which are in both-way junction through a secure channel. The user module serves as a user terminal and comprises a ciphertext verifier, an encipher and a decipher. System setting, the encryption step and the decryption step are adopted to carry out the encryption operation and the decryption operation on user information. By means of the anti-elastic-leakage encryption method and system based on identification, the computing cost of an encryption equation can be greatly reduced, the operation efficiency of the whole system is improved, and a shorter private key length and a higher relative private key leakage ratio are achieved.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to an identity-based anti-resilient leakage encryption method and system. Background technique [0002] In the traditional public key cryptosystem, the public key certificate infrastructure PKI (Public Key Infrastructure) is mainly used to verify the correlation between the public key and the identity of the user. The association between the user identity and the public key is realized through the public key certificate issued by the certification authority (Certification Authority: CA). The certificate management process in this way requires high computing overhead and storage overhead. [0003] The idea of ​​identity-based cryptosystem was first proposed by Shamir in 1984. In this system, the public key is the user's identity information (or directly derived from the user's identity information), such as the IP address of a host in the network or the email address of a user. PKG ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08
Inventor 李继国陈超东张乐
Owner 马鞍山城智信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products